Looking at a list of approved government vendors, Russia targeted them. The goal was by compromising an IT product in the “supply chain” they could then gain access to the larger US network, through that product.
The first step was gaining access to the server that sends updates to a SolarWinds application. Those updates, like the ones for your iPhone, are sent to installed applications on gov, commercial, edu etc networks. And they are trusted. Nobody checks a patch to see for security.
So the SolarWinds server sent what appeared to be a legitimate update - because it was. The patch was digitally signed by SolarWinds and security officials to analyze patches for security risk, rather, they make sure it doesn’t break anything.
But this hack was smart, it waited 14 days before it contacted its C2 node. Who watches a patch for 14 days? It opened a door to servers running this patch for the Russians to walk through and get to other servers.
What they subsequently gained access too is unknown — and that is terrifying.
You can follow @NaveedAJamali.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.